An Intelligent Optimal Secure Framework for Malicious Events Prevention in IOT Cloud Networks

Main Article Content

Majjaru Chandra Babu
Senthilkumar K

Abstract

The intrusion is considered a significant problematic parameter in Cloud networks. Thus, an efficient mechanism is required to avoid intrusion and provide more security to the cloud system. Therefore, the novel Artificial Bee-based Elman Neural Security Framework (ABENSF) is developed in this article. The developed model rescales the raw dataset using the pre-processing function. Moreover, the artificial bee's optimal fitness function is integrated into the feature extraction phase to track and extract the attack features. In addition, the monitoring mechanism in the developed model provides high security to the network by preventing attacks. Thus, the tracking and monitoring functions avoid intrusion by eliminating known and unknown attacks. The presented work was designed and validated with an NSL-KDD dataset in python software. Finally, the performance parameters of the presented work are estimated and verified with the existing techniques in a comparative analysis. The comparative performance shows that the developed model has earned better outcomes than others.

Article Details

How to Cite
Babu, M. C. ., & K, S. . (2023). An Intelligent Optimal Secure Framework for Malicious Events Prevention in IOT Cloud Networks. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 117–127. https://doi.org/10.17762/ijritcc.v11i3.6328
Section
Articles

References

B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,” IEEE Access, Vol. 9, pp. 57792-57807, 2021. https://doi.org/10.1109/ACCESS.2021.3073203.

F. Muheidat, and L. Tawalbeh, “Mobile and Cloud Computing Security”, In: Y. Maleh, M. Shojafar, M. Alazab, and Y. Baddi, (eds.) “Machine Intelligence and Big Data Analytics for Cybersecurity Applications,” Studies in Computational Intelligence, vol. 919, 2021. Springer, Cham. https://doi.org/10.1007/978-3-030-57024-8_21.

L.M. Dang, M.J. Piran, D. Han, K. Min, and H. Moon, “A Survey on Internet of Things and Cloud Computing for Healthcare,” Electronics, Vol. 8, pp. 768, 2019. https://doi.org/10.3390/electronics8070768.

F. Nadeem, “Evaluating and Ranking Cloud IaaS, PaaS and SaaS Models Based on Functional and Non-Functional Key Performance Indicators,” IEEE Access, Vol. 10, pp. 63245-63257, 2022. https://doi.org/10.1109/ACCESS.2022.3182688.

F. Shokri Habashi, S. Yousefi, and B. Ghalebsaz Jeddi, “Resource allocation mechanisms for maximizing provider’s revenue in infrastructure as a service (IaaS) cloud,” Cluster Computing, Vol. 24, pp. 2407–2423, 2021. https://doi.org/10.1007/s10586-021-03262-y.

A. Olmsted, “Platform As A Service Development Cost & Security,” International Journal of Intelligent Systems, Vol. 10, pp. 3-4, 2017.

C. Hanane, A. Battou, and O. Baz, “Performance Security in Distributed System: Comparative Study,” International Journal of Computer Applications, Vol. 179, pp. 15, 2018.

R. Gupta, S. Verma, and K. Janjua, “Custom Application Development in Cloud Environment: Using Salesforce,” 2018 4th International Conference on Computing Sciences (ICCS), pp. 23-27, 2018. https://doi.org/10.1109/ICCS.2018.00010.

I. Odun-Ayo, M. Ananya, F. Agono, and R. Goddy-Worlu, “Cloud Computing Architecture: A Critical Analysis,” 2018 18th International Conference on Computational Science and Applications (ICCSA), pp. 1-7. https://doi.org/10.1109/ICCSA.2018.8439638.

J.B. Wang, J. Wang, Y. Wu, J.Y. Wang, H. Zhu, M. Lin, and J. Wang, “A Machine Learning Framework for Resource Allocation Assisted by Cloud Computing,” IEEE Network, Vol. 32, No. 2, pp. 144-151, 2018. https://doi.org/10.1109/MNET.2018.1700293.

Z. Wang, S. Yang, X. Xiang, A. Vasilijevi?, N. Miškovi?, and D. Na?, “Cloud-based mission control of USV fleet: Architecture, implementation and experiments,” Control Engineering Practice, Vol. 106, pp. 104-657, 2021. https://doi.org/10.1016/j.conengprac.2020.104657.

L. Hong-tan, K. Cui-hua, B. Muthu, and C.B. Sivaparthipan, “Big data and ambient intelligence in IoT-based wireless student health monitoring system,” Aggression and Violent Behavior, pp.101-601, 2021. https://doi.org/10.1016/j.avb.2021.101601.

C. Chen, B. Liu, S. Wan, P. Qiao, and Q. Pei, “An Edge Traffic Flow Detection Scheme Based on Deep Learning in an Intelligent Transportation System,” IEEE Transactions on Intelligent Transportation Systems, Vol. 22, Ch. 3, pp. 1840-1852, 2020. https://doi.org/10.1109/TITS.2020.3025687.

T.M. Ghazal, “Positioning of UAV Base Stations Using 5G and Beyond Networks for IoMT Applications,” Arabian Journal for Science and Engineering, https://doi.org/10.1007/s13369-021-05985-x.

K. Yu, L. Lin, M. Alazab, L. Tan, and B. Gu, “Deep Learning-Based Traffic Safety Solution for a Mixture of Autonomous and Manual Vehicles in a 5G-Enabled Intelligent Transportation System,” IEEE Transactions on Intelligent Transportation Systems, Vol. 22 Ch. 7, pp. 4337-4347, 2020. https://doi.org/10.1109/TITS.2020.3042504.

J.B. Wang, J. Wang, Y. Wu, J.Y. Wang, H. Zhu, M. Lin, and J. Wang, “A Machine Learning Framework for Resource Allocation Assisted by Cloud Computing,” IEEE Network, Vol. 32, Ch. 2, pp. 144-151, 2018. https://doi.org/10.1109/MNET.2018.1700293.

O. Azeroual, M. Jha, A. Nikiforova, K. Sha, M. Alsmirat, and S. Jha, “A Record Linkage-Based Data Deduplication Framework with DataCleaner Extension,” Multimodal Technologies and Interaction, Vol. 6, Ch. 27, 2022. https://doi.org/10.3390/mti6040027.

B. Richhariya, M. Tanveer, and A.H. Rashid, “Diagnosis of Alzheimer's disease using universum support vector machine based recursive feature elimination (USVM-RFE),” Biomedical Signal Processing and Control, Vol. 59, pp. 101-903, 2020. https://doi.org/10.1016/j.bspc.2020.101903.

D. Han, S. Li, Y. Peng, and Z. Chen, “Energy Sharing-Based Energy and User Joint Allocation Method in Heterogeneous Network,” IEEE Access, Vol.8, pp. 37077-37086, 2020. https://doi.org/10.1109/ACCESS.2020.2975293.

S. Singh, and H.S. Saini, “Intelligent Ad-Hoc-On Demand Multipath Distance Vector for Wormhole Attack in Clustered WSN,” Wireless Personal Communications, Vol. 122, pp. 1305–1327, 2022. https://doi.org/10.1007/s11277-021-08950-x.

P.A. Abdalla, and A. Varol, “Advantages to Disadvantages of Cloud Computing for Small-Sized Business,” 2019 7th International Symposium on Digital Forensics and Security (ISDFS), pp. 1-6, 2019. https://doi.org/10.1109/ISDFS.2019.8757549.

P.M. Khilar, V. Chaudhari, and R.R. Swain, “Trust-Based Access Control in Cloud Computing Using Machine Learning”, In: H. Das, R. Barik, H. Dubey, and D. Roy, (eds.) “Cloud Computing for Geospatial Big Data Analytics,” Studies in Big Data, vol. 49, 2019. Springer, Cham. https://doi.org/10.1007/978-3-030-03359-0_3.

S. Gill, “Predicting the growth and trend of COVID-19 pandemic using machine learning and cloud computing,” Internet of Things, Vol. 11, pp.100-222, 2020. https://doi.org/10.1016/j.iot.2020.100222.

A. Abdelaziz, M. Elhoseny, A.S. Salam, and A.M. Riad, “A machine learning model for improving healthcare services on cloud computing environment,” Measurement, Vol. 119, pp. 117-128, 2018. https://doi.org/10.1016/j.measurement.2018.01.022.

J. Gao, H. Wang, and H. Shen, “Machine Learning Based Workload Prediction in Cloud Computing,” 2020 29th International Conference on Computer Communications and Networks (ICCCN), pp. 1-9, https://doi.org/10.1109/ICCCN49398.2020.9209730.

C.L. Stergiou, A.P. Plageras, K.E. Psannis, and B.B. Gupta, “Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network”, In: B. Gupta, G. Perez, D. Agrawal, and D. Gupta, (eds.) Handbook of Computer Networks and Cyber Security, Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_21.

B. Jothi, and M. Pushpalatha, “WILS-TRS — a novel optimized deep learning based intrusion detection framework for IoT networks,” Personal and Ubiquitous Computing, 2021, https://doi.org/10.1007/s00779-021-01578-5.

N. Koroniotis, N. Moustafa, and E. Sitnikova, “A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework,” Future Generation Computer Systems, Vol. 110, pp. 91-106, 2020. https://doi.org/10.1016/j.future.2020.03.042.